05-18-2020, 07:27 AM
The size of the data being cracked does not generally change the difficulty of cracking the passphrase. It doesn't look like pCloud is something that hashcat can crack, so it's down to either Veracrypt or GPG. The easiest way to see which one would be quicker is to try a crack on each -- hashcat will tell you which one will finish quicker for a given candidate list. Based on your description, the mask you want is probably `a?l?l?l?l?l?l?l?l?l2015`.